CN106204984A - A kind of burglary-resisting installation based on wireless signal and method - Google Patents

A kind of burglary-resisting installation based on wireless signal and method Download PDF

Info

Publication number
CN106204984A
CN106204984A CN201610480931.5A CN201610480931A CN106204984A CN 106204984 A CN106204984 A CN 106204984A CN 201610480931 A CN201610480931 A CN 201610480931A CN 106204984 A CN106204984 A CN 106204984A
Authority
CN
China
Prior art keywords
mobile terminal
information
access request
communication module
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610480931.5A
Other languages
Chinese (zh)
Inventor
宋景耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610480931.5A priority Critical patent/CN106204984A/en
Publication of CN106204984A publication Critical patent/CN106204984A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of burglary-resisting installation based on wireless signal, including: first communication module, for receiving the access request information of mobile terminal;Control module, for processing access request information and controlling other modules, described control module includes analyzing module and signal processing module, described analysis module is for obtaining the mobile terminal identification information being included in access request information and judging whether described mobile terminal identification information is the secure ID pre-set, and described signal processing module is for judging that whether the signal intensity of the access request information of mobile terminal is more than the signal strength threshold preset;Second communication module, the signal intensity being used for when described mobile terminal identification information secure ID and the described access request information pre-set described in not being sends warning information more than the signal strength threshold preset.The burglary-resisting installation of the present invention is simple, practical, solves the problem that existing burglary-resisting system is complicated, expensive, is more suitable for average family than existing burglary-resisting system.

Description

A kind of burglary-resisting installation based on wireless signal and method
Technical field
The present invention relates to a kind of burglary-resisting installation, a kind of burglary-resisting installation based on wireless signal.
Background technology
Along with growth in the living standard, household theftproof system the most increasingly intelligence.But how sharp existing household theftproof system is Use multiple pir intrusion detector, monitor home environment, when abnormal conditions occur, send a warning message or take other protection to arrange Execute.On the one hand, this kind of burglary-resisting system, in home environment, many places detector need to be installed, for commonly taking in house such as door, window etc. Front yard, this kind of burglary-resisting system cost is prohibitively expensive and uses excessively complicated.On the other hand the most infrared spy of these pir intrusion detectors Survey device and cannot distinguish between Security Officer and a suspect, the situation of error in judgement easily occurs.
And WiFi technology has been popularized at average family, WIFI in addition to basic network service is provided, additional some Function is more and more paid attention to by people.Domestic WIFI product, typically provides only wirelessly access at present, and additional function is almost Zero, use the most single, Market competition.Existing home security technology has applied WiFi technology, but is confined to application WiFi technology does information transmission.
Therefore, for catering to the consumption demand of ordinary populace, more the WiFi technology popularized is dissolved into antitheft system In system so that burglary-resisting system is simpler, convenient, effective and economy is a kind of practicable way.
Summary of the invention
For solving the problems referred to above, the present invention provides a kind of burglary-resisting installation based on wireless signal, including:
First communication module, for receiving the access request information of mobile terminal;
Control module, is used for processing access request information and controlling other modules, and described control module includes analyzing mould Block and signal processing module, described analysis module is for obtaining the mobile terminal identification information being included in access request information also Judging whether described mobile terminal identification information is the secure ID pre-set, described signal processing module is used for judging to move Whether the signal intensity of the access request information of terminal is more than the signal strength threshold preset;
Second communication module, is used for when described mobile terminal identification information secure ID and the institute pre-set described in not being The signal intensity stating access request information sends warning information more than the signal strength threshold preset.
Preferably, described warning information includes mobile terminal identification information.
Preferably, described second communication module is mobile communication module or/and data communication module.
Preferably, also include:
Third communication module, the signal intensity for the access request information when described mobile terminal is more than the signal preset During intensity threshold and mobile terminal identification information is not the secure ID pre-set, send monitoring image solicited message to monitoring Equipment, and for receiving the image information that monitoring device sends;
The warning information that described second communication module sends comprises described image information.
Preferably, described second communication module is additionally operable to receive the monitoring solicited message that subscriber equipment is sent;
Fourth communication module, is used for sending monitoring solicited message to monitoring device, is additionally operable to receive what monitoring device sent Image information;
Described second communication module is additionally operable to send described image information to subscriber equipment.
The present invention also provides for a kind of theft preventing method based on wireless signal, is applied to radio reception device, including step:
Receive the access request information of mobile terminal;
Obtain the mobile terminal identification information being included in access request information;
When described mobile terminal access request information signal intensity more than preset signal strength threshold time and movement Terminal identification information is not the secure ID pre-set, and sends warning information.
Preferably, described warning information includes mobile terminal identification information.
Preferably, described warning information by radio reception device by mobile communications network or/and data communication network is sent out Go out.
Preferably, further comprise the steps of:
When described mobile terminal access request information signal intensity more than preset signal strength threshold time and movement Terminal identification information is not the secure ID pre-set, and sends monitoring image solicited message to monitoring device;
Receive the image information that monitoring device sends;
Sending warning information, described warning information includes described image information.
Preferably, further comprise the steps of:
Receive the monitoring solicited message that subscriber equipment is sent;
Send monitoring image solicited message to monitoring device;
Receive the image information that monitoring device sends;
Described image information is sent to subscriber equipment.
The wireless access function that the present invention has by utilizing existing radio reception device and mobile terminal, is wrapped by identification The wireless access signal intensity being contained in the identification information in wireless access solicited message and quantization mobile terminal judges whether Having stranger to enter the room, antitheft mode is simple, economic, practical, solves the problem that existing burglary-resisting system is complicated, expensive, and ratio is existing Burglary-resisting system is more suitable for average family.
Accompanying drawing explanation
Fig. 1 is the module diagram of the embodiment of the present invention one;
Fig. 2 is the module diagram of the embodiment of the present invention two;
Fig. 3 is the module diagram of the embodiment of the present invention three;
Fig. 4 is the schematic flow sheet of the embodiment of the present invention four;
Fig. 5 is the schematic flow sheet of the embodiment of the present invention five;
Fig. 6 is the schematic flow sheet of the embodiment of the present invention six.
Detailed description of the invention
In order to make relevant technical staff in the field be more fully understood that technical scheme, real below in conjunction with the present invention Execute the accompanying drawing of mode, the technical scheme in embodiment of the present invention is clearly and completely described, it is clear that described reality The mode of executing is only a part of embodiment of the present invention rather than whole embodiments.
Embodiment one
As it is shown in figure 1, a kind of burglary-resisting installation based on wireless signal, including following module:
First communication module 11, for receiving the access request information of mobile terminal;
Control module 12, is used for processing access request information and controlling other modules, and described control module includes analyzing Module 121 and signal processing module 122, described analysis module 121 is for obtaining the mobile end being included in access request information End identification information also judges whether described mobile terminal identification information is the secure ID pre-set, described signal processing module 122 for judging that whether the signal intensity of the access request information of mobile terminal is more than the signal strength threshold preset;
Second communication module 13, is used for sending warning information.
Control module 12 is connected with first communication module 11, second communication module 13 respectively.First communication module 11 receives After the access request information of one or more mobile terminals, the access request information of these one or more mobile terminals is transmitted extremely Analyze module 121 and signal processing module 122.Analyze module 121 resolve access request information and extract mobile terminal therein Identification information, and this mobile terminal identification information is compared with the secure ID pre-set, it is judged that this mobile terminal identification Whether information is the secure ID pre-set.The secure ID pre-set can be one or more.Because at one family In have many people to use mobile terminal, the identification information of the mobile terminal of household internal can be both configured to secure ID by user. Signal processing module 122 quantifies the signal intensity of this access request information, and by the signal intensity of this access request information with pre- If signal strength threshold compare, it is judged that whether the signal intensity of this access request information more than the signal intensity threshold preset Value.Analyze module 121 obtain the mobile terminal identification information being included in access request information and judge described mobile terminal mark Whether knowledge information is the secure ID pre-set, and signal processing module 122 judges the access request information of mobile terminal Signal intensity whether more than the signal strength threshold preset, two steps can be carried out simultaneously, it is also possible to according to sequencing Carry out successively.Mobile terminal identification information can be the one or more information identifying this mobile terminal, such as mobile terminal MAC One or more in address, mobile terminal title, mobile terminal serial number.
When the mobile terminal identification information in access request information is not default secure ID, the movement of stranger is described Terminal attempts accessing radio reception device.And the signal intensity of access request information is more than the signal strength threshold preset, explanation This stranger position is very close to burglary-resisting installation, then the control module 12 of burglary-resisting installation controls second communication module 13 and sends Warning information.This warning information can be sent to user terminal, and user terminal takes further step according to warning information, than Start as dialed the police emergency number or controlling other burglary-resisting installations.This warning information can include the identification information of mobile terminal.
The second communication module 13 of burglary-resisting installation can be data communication module or/and mobile communication module.When second leads to Letter module 13 is data communication module, and warning information is transferred to user terminal by the WAN port of radio reception device and sets Standby.When second communication module 13 is mobile communication module, warning information is transferred to user terminal through mobile communications network.Excellent Choosing, second communication module 13 is mobile communication module, such as built-in sim card or arrange sim draw-in groove in burglary-resisting installation.User Terminal receives warning information in modes such as note, mail or instant messagings.Comparatively speaking, mobile communications network is relatively stable, Can ensure that user terminal receives warning information.
In the present embodiment, determine whether strange shifting by the identification information and access signal intensity obtaining mobile terminal Dynamic terminal, close to burglary-resisting installation thus in determining whether the space that stranger enters protection, realizes the merit of anti-theft alarm with this Can, simpler than existing burglary-resisting system, practical.
The burglary-resisting installation of the present invention can be radio reception device, such as WAP or wireless router.
The preferred WIFI module of first communication module 11, wireless access solicited message is the probe request that mobile terminal sends (probe request).According to 802.11 agreements, the WIFI module of radio reception device can be periodically to periphery broadcast mode Sending beacon frame, mobile terminal also can periodically send probe request simultaneously, and this probe request comprises mobile terminal Identification information.Even if in the case of mobile terminal is the most unverified, the WIFI module of radio reception device equally intercepts shifting The probe request of dynamic terminal, obtains the identification information of mobile terminal further.WIFI module be used only to interpretation this Bright, it is WIFI module that protection scope of the present invention does not limit first communication module.It addition, according to product standard, mobile terminal institute The RF signal strength launched must control in the range of some, the product of the most any a mobile terminal, and it is launched WIFI signal emissive porwer is close.Further, it is well known that signal intensity can be decayed along with the increase of distance, therefore according to nothing The signal intensity of line access device can speculate the distance of mobile terminal and radio reception device.The present embodiment and other enforcement Example is based on principles above and realizes.
Present stage, the smart mobile phone overwhelming majority on market has WIFI module, the first communication module choosing of the present embodiment Select WIFI module, on the one hand ensure that the compatibility of burglary-resisting system, be namely capable of identify that any one includes WIFI module Mobile terminal, has on the other hand then saved cost.
The burglary-resisting installation of the present embodiment is best suitable for family and uses, and in common home environment, will not use and comprise multiple stage The burglary-resisting system of equipment, and the anti-theft alarm mode that the burglary-resisting installation of the present embodiment provides is simple, practical.Enter when there being stranger Room, the mobile terminal broadcast radio access request information that it carries, this burglary-resisting installation finds the mobile terminal of this stranger, sends Warning information, to user terminal, is determined to take further anti-theft measure by user.
The present embodiment can also include with lower module:
Human-computer interaction module, for receiving the secure ID of user setup;
Memory module, for storing the mark of user setup.
This human-computer interaction module can be provided in touch screen or the button etc. of burglary-resisting installation the machine and can be used for user's input The module of configuration information, it is possible to be the interface being connected with user terminal A PP, for receiving configuration information from user terminal.When with After family pre-sets secure ID by human-computer interaction module, this secure ID is stored in memory module by radio reception device In.
Embodiment two
As in figure 2 it is shown, the present embodiment two also includes on the basis of embodiment one:
Third communication module 14, the signal intensity for the access request information when described mobile terminal is more than the letter preset During number intensity threshold and mobile terminal identification information is not the secure ID pre-set, send monitoring image solicited message to prison Control equipment, and for receiving the image information that monitoring device sends;
Described second communication module 13 sends described image information.
Judge that mobile terminal identification information is not the secure ID pre-set when analyzing module 121, and signal processing Module 122 judges that the signal intensity of the access request information of mobile terminal is more than the signal strength threshold preset, control module 12 Control third communication module 14 and send monitoring image solicited message to monitoring device.This monitoring device receives monitoring image request letter Breath, opens shoot function, shoots image information, and image information is sent to the third communication module 14 of burglary-resisting installation.Antitheft The control module 12 of equipment controls second communication module 13 and sends a warning message and this image information is to user terminal.This is antitheft sets Standby third communication module 14 can be WIFI module, or/and wired local network interface, or/and bluetooth module.Described monitoring sets For being arranged in the same space of burglary-resisting installation, and include one or more.
In the present embodiment, after burglary-resisting installation finds strange mobile terminal identification, first inform that monitoring device gathers image letter Breath, and this image information and warning information are transmitted to user terminal, user terminal is judged by the image information of instant shooting Whether there is stranger in Jia, help user to improve judgment accuracy further.
Embodiment three
The present embodiment three, on the basis of embodiment one, also includes:
Described second communication module 13 is additionally operable to receive the monitoring solicited message that subscriber equipment is sent;
Fourth communication module 15, is used for sending monitoring solicited message to monitoring device, is additionally operable to receive monitoring device and sends Image information;
Described second communication module 13 is additionally operable to send described image information to subscriber equipment.
When the second communication module 13 of burglary-resisting installation sends warning information, and user terminal receives this warning information, if used When family confirms to comprise strange information of mobile terminal or strangers information in this warning information, send monitoring solicited message and set to antitheft Standby, the second communication module 13 of burglary-resisting installation receives this monitoring solicited message, and the control module 12 of burglary-resisting installation controls four-way This monitoring solicited message is transmitted to monitoring device by letter module 15, and monitoring device receives this monitoring solicited message, opens shooting merit Can, collection image information, and this image information is sent to the fourth communication module of radio reception device, radio reception device Control module 12 controls second communication module 13 and image information is transmitted to mobile terminal.This image information can be one or many Open photo, it is also possible to be one section of video.The fourth communication module 15 of burglary-resisting installation can be WIFI module, or/and wired local Network interface, or/and bluetooth module.
In the present embodiment, after burglary-resisting installation finds strange mobile terminal identification, first send a warning message to user terminal, Gathered image information image information is sent to user by monitoring device again by the user decide whether, on the one hand believed by image Breath improves the accuracy that user judges, on the other hand avoids burglary-resisting installation erroneous judgement and brings asking of waste flow to user terminal Topic.
Embodiment four
Embodiment four is a kind of theft preventing method based on wireless signal, is applied to radio reception device, including step:
S41, receives the access request information of mobile terminal;
S42, obtains the mobile terminal identification information being included in access request information;
S43, when described mobile terminal access request information signal intensity more than preset signal strength threshold time and Mobile terminal identification information is not the secure ID pre-set, and sends warning information.
When the wireless communication module of mobile terminal is opened, outwards broadcast access request information is with accessible wireless of scanning Access device.Radio reception device receives the access request information of mobile terminal.This access request information can be 802.11 associations The probe request (probe request) of view.According to 802.11 agreements, the WIFI module of radio reception device can be periodically Sending beacon frame to periphery broadcast mode, mobile terminal also can periodically send probe request (probe simultaneously Request), this probe request comprises mobile terminal identification information.Even if in the case of mobile terminal is the most unverified, wireless Access device equally intercepts the probe request of mobile terminal, obtains the identification information of mobile terminal further.
Radio reception device receives and analyzes the access request information of mobile terminal, extracts the mobile terminal being included in Identification information.This terminal identification information includes that identification information can include identifying one or more information of this mobile terminal, than One or more as in mobile terminal MAC Address, mobile terminal title, mobile terminal serial number.Radio reception device should Terminal identification information is stored in radio reception device the secure ID preset and contrasts, it is judged that this terminal identification information wireless Whether it is default secure ID.This secure ID preset can be one or more.
Radio reception device quantifies the signal intensity of this access request information, and by the signal intensity of this access request information Make comparisons with default signal strength threshold, it is judged that the signal intensity of described access request information is the strongest more than the signal preset Degree threshold value.
When the mobile terminal identification information in access request information is not default secure ID, the movement of stranger is described Terminal attempts accessing radio reception device.And the signal intensity of access request information is more than the signal strength threshold preset, explanation This stranger position is very close to radio reception device, then radio reception device sends warning information.This warning information can To be sent to user terminal, user terminal takes further step according to warning information, such as dials the police emergency number or controls Make other burglary-resisting installations to start.This warning information can include the identification information of mobile terminal.Radio reception device can will be accused Alarming information sends through mobile communications network or data communication network.
The present embodiment can also include step:
Receive and the secure ID of storage user setup.
User pre-sets secure ID by the interactive module that mobile phone A PP or radio reception device carry, and wireless connects Enter equipment and receive this secure ID, and this secure ID is stored in memory module.
The theft preventing method that the present embodiment provides is best suitable for family and uses, and in common home environment, will not use and comprise The burglary-resisting system of multiple devices, and the anti-theft alarm mode that the present embodiment provides is simple, practical.When there being stranger to enter the room, it is taken The mobile terminal broadcast radio access request information of band, radio reception device finds the mobile terminal of this stranger, sends alarm Information, to user terminal, is determined to take further anti-theft measure by user.
Embodiment five
As it is shown in figure 5, the present embodiment five includes step:
S51, receives the access request information of mobile terminal;
S52, obtains the mobile terminal identification information being included in access request information;
S53, when described mobile terminal access request information signal intensity more than preset signal strength threshold time and Mobile terminal identification information is not the secure ID pre-set, and sends monitoring image solicited message to monitoring device;
S54, receives the image information that monitoring device sends;
S55, sends warning information, and described warning information includes described image information.
When the mobile terminal identification information in access request information is not default secure ID and described mobile terminal When the signal intensity of access request information is more than the signal strength threshold preset, radio reception device sends monitoring image request letter Breath is to monitoring device.This monitoring device receives monitoring image solicited message, opens shoot function, shoots image information, and will figure As information is sent to radio reception device.Radio reception device sends warning information, and described warning information includes this image information. This warning information can be sent to user terminal, and user terminal takes further step according to warning information, such as dials report Warn phone or controlling other burglary-resisting installations starts.This warning information can include the identification information of mobile terminal.
In the present embodiment, after radio reception device finds strange mobile terminal identification, monitoring device collection figure is first informed As information, and this image information and warning information being transmitted to user terminal, user terminal is by the image information of instant shooting Judge whether family has stranger, help user to improve judgment accuracy further.
Embodiment six
As shown in Figure 6, the present embodiment six, on the basis of embodiment four, also includes:
S61, receives the monitoring solicited message that subscriber equipment is sent;
S62, sends monitoring image solicited message to monitoring device;
S63, receives the image information that monitoring device sends;
S64, sends described image information to subscriber equipment.
When radio reception device sends warning information, and user terminal receives this warning information, if user confirms this alarm When comprising strange information of mobile terminal or strangers information in information, transmission monitoring solicited message is to radio reception device, wireless Access device receives this monitoring solicited message, then this monitoring solicited message is transmitted to monitoring device, and monitoring device receives this prison Control solicited message, opens shoot function, gathers image information, and this image information is sent to radio reception device, by wireless Image information is transmitted to mobile terminal by access device.This image information can be one or more photo, it is also possible to be one section Video.Radio reception device can be connected with monitoring device by WIFI module or wired local network interface.
In the present embodiment, after radio reception device finds strange mobile terminal identification, first send a warning message to user Terminal, is gathered image information image information is sent to user by monitoring device again by the user decide whether, on the one hand passes through Image information improves the accuracy that user judges, on the other hand avoids radio reception device erroneous judgement and brings wave to user terminal The problem taking flow.
Below only have expressed the several embodiments of the present invention, it describes more concrete and in detail, but can not therefore and It is interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that, for the person of ordinary skill of the art, do not taking off On the premise of present inventive concept, it is also possible to make some deformation and improvement, these broadly fall into protection scope of the present invention.Cause This, the protection domain of patent of the present invention should be as the criterion with claims.

Claims (10)

1. a burglary-resisting installation based on wireless signal, it is characterised in that including:
First communication module, for receiving the access request information of mobile terminal;
Control module, is used for processing access request information and controlling other modules, described control module include analyze module and Signal processing module, described analysis module is for obtaining the mobile terminal identification information being included in access request information and judging Whether described mobile terminal identification information is the secure ID pre-set, and described signal processing module is used for judging mobile terminal The signal intensity of access request information whether more than the signal strength threshold preset;
Second communication module, the secure ID pre-set described in when described mobile terminal identification information be not and described in connect The signal intensity entering solicited message sends warning information more than the signal strength threshold preset.
Burglary-resisting installation based on wireless signal the most according to claim 1, it is characterised in that
Described warning information includes mobile terminal identification information.
Burglary-resisting installation based on wireless signal the most according to claim 1, it is characterised in that
Described second communication module is mobile communication module or/and data communication module.
4. according to the burglary-resisting installation based on wireless signal described in claim 1-3 any one, it is characterised in that also include:
Third communication module, the signal intensity for the access request information when described mobile terminal is more than the signal intensity preset During threshold value and mobile terminal identification information is not the secure ID pre-set, send monitoring image solicited message and set to monitoring Standby, and for receiving the image information that monitoring device sends;
The warning information that described second communication module sends comprises described image information.
5. according to the burglary-resisting installation based on wireless signal described in claim 1-3 any one, it is characterised in that
Described second communication module is additionally operable to receive the monitoring solicited message that subscriber equipment is sent;
Fourth communication module, is used for sending monitoring solicited message to monitoring device, is additionally operable to receive the image that monitoring device sends Information;
Described second communication module is additionally operable to send described image information to subscriber equipment.
6. a theft preventing method based on wireless signal, is applied to radio reception device, it is characterised in that include step:
Receive the access request information of mobile terminal;
Obtain the mobile terminal identification information being included in access request information;
When described mobile terminal access request information signal intensity more than preset signal strength threshold time and mobile terminal Identification information is not the secure ID pre-set, and sends warning information.
Theft preventing method based on wireless signal the most according to claim 6, it is characterised in that
Described warning information includes mobile terminal identification information.
Theft preventing method based on wireless signal the most according to claim 6, it is characterised in that
Described warning information by radio reception device by mobile communications network or/and data communication network sends.
9. according to the theft preventing method based on wireless signal described in claim 6-8 any one, it is characterised in that also include step Rapid:
When described mobile terminal access request information signal intensity more than preset signal strength threshold time and mobile terminal Identification information is not the secure ID pre-set, and sends monitoring image solicited message to monitoring device;
Receive the image information that monitoring device sends;
Sending warning information, described warning information includes described image information.
10. according to the theft preventing method based on wireless signal described in claim 6-8 any one, it is characterised in that also include Step:
Receive the monitoring solicited message that subscriber equipment is sent;
Send monitoring image solicited message to monitoring device;
Receive the image information that monitoring device sends;
Described image information is sent to subscriber equipment.
CN201610480931.5A 2016-06-27 2016-06-27 A kind of burglary-resisting installation based on wireless signal and method Pending CN106204984A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610480931.5A CN106204984A (en) 2016-06-27 2016-06-27 A kind of burglary-resisting installation based on wireless signal and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610480931.5A CN106204984A (en) 2016-06-27 2016-06-27 A kind of burglary-resisting installation based on wireless signal and method

Publications (1)

Publication Number Publication Date
CN106204984A true CN106204984A (en) 2016-12-07

Family

ID=57461371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610480931.5A Pending CN106204984A (en) 2016-06-27 2016-06-27 A kind of burglary-resisting installation based on wireless signal and method

Country Status (1)

Country Link
CN (1) CN106204984A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106940546A (en) * 2017-04-24 2017-07-11 北京北信源软件股份有限公司 Intelligent switch panel, smart home and physical space swarm into monitoring method
CN107067619A (en) * 2017-03-21 2017-08-18 上海斐讯数据通信技术有限公司 A kind of network theft preventing method and system
CN107105411A (en) * 2017-05-27 2017-08-29 北京北信源软件股份有限公司 A kind of mobile intelligent terminal track monitoring system and method based on intelligent switch panel
CN107170185A (en) * 2017-06-20 2017-09-15 上海斐讯数据通信技术有限公司 A kind of security alarm method based on radio reception device, radio reception device
CN107567016A (en) * 2017-08-25 2018-01-09 中国联合网络通信集团有限公司 A kind of home security method and device
CN107818652A (en) * 2017-10-23 2018-03-20 北京小米移动软件有限公司 Information processing method and equipment
CN108809937A (en) * 2018-04-20 2018-11-13 广州天电科技有限公司 A kind of managing and control system and method
CN112053524A (en) * 2020-08-28 2020-12-08 苏州昭轩数字科技有限公司 Intelligent alert reminding method and system based on signal detection
CN112466079A (en) * 2021-01-22 2021-03-09 常州百芝龙智慧科技有限公司 Public area security sensing and monitoring equipment and method
CN112671620A (en) * 2020-12-21 2021-04-16 珠海格力电器股份有限公司 Equipment control method and device, storage medium and mobile terminal
CN114120600A (en) * 2020-08-31 2022-03-01 南京蓝思信息科技有限公司 Method and device for preventing false alarm of intelligent wearable equipment and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130040603A1 (en) * 2011-08-12 2013-02-14 F-Secure Corporation Wireless access point detection
CN103198632A (en) * 2013-04-09 2013-07-10 姚争辉 Indoor security and protection system achieving intelligent human-body identification and master identification
CN103401691A (en) * 2013-07-18 2013-11-20 山东省计算中心 Portable WiFi equipment invasion precautionary method
CN105336061A (en) * 2015-11-13 2016-02-17 上海斐讯数据通信技术有限公司 Indoor anti-theft processing method, system and wireless access point
CN205092974U (en) * 2015-09-07 2016-03-16 阿里巴巴集团控股有限公司 WLAN access equipment
CN105592457A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Wireless network connection method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130040603A1 (en) * 2011-08-12 2013-02-14 F-Secure Corporation Wireless access point detection
CN103198632A (en) * 2013-04-09 2013-07-10 姚争辉 Indoor security and protection system achieving intelligent human-body identification and master identification
CN103401691A (en) * 2013-07-18 2013-11-20 山东省计算中心 Portable WiFi equipment invasion precautionary method
CN105592457A (en) * 2014-10-22 2016-05-18 中兴通讯股份有限公司 Wireless network connection method and apparatus
CN205092974U (en) * 2015-09-07 2016-03-16 阿里巴巴集团控股有限公司 WLAN access equipment
CN105336061A (en) * 2015-11-13 2016-02-17 上海斐讯数据通信技术有限公司 Indoor anti-theft processing method, system and wireless access point

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107067619B (en) * 2017-03-21 2020-02-11 上海斐讯数据通信技术有限公司 Anti-theft method and system based on network
CN107067619A (en) * 2017-03-21 2017-08-18 上海斐讯数据通信技术有限公司 A kind of network theft preventing method and system
CN106940546A (en) * 2017-04-24 2017-07-11 北京北信源软件股份有限公司 Intelligent switch panel, smart home and physical space swarm into monitoring method
CN107105411A (en) * 2017-05-27 2017-08-29 北京北信源软件股份有限公司 A kind of mobile intelligent terminal track monitoring system and method based on intelligent switch panel
CN107170185A (en) * 2017-06-20 2017-09-15 上海斐讯数据通信技术有限公司 A kind of security alarm method based on radio reception device, radio reception device
CN107567016A (en) * 2017-08-25 2018-01-09 中国联合网络通信集团有限公司 A kind of home security method and device
CN107818652A (en) * 2017-10-23 2018-03-20 北京小米移动软件有限公司 Information processing method and equipment
CN108809937A (en) * 2018-04-20 2018-11-13 广州天电科技有限公司 A kind of managing and control system and method
CN108809937B (en) * 2018-04-20 2021-02-09 广州天电科技有限公司 Management and control system and method
CN112053524A (en) * 2020-08-28 2020-12-08 苏州昭轩数字科技有限公司 Intelligent alert reminding method and system based on signal detection
CN114120600A (en) * 2020-08-31 2022-03-01 南京蓝思信息科技有限公司 Method and device for preventing false alarm of intelligent wearable equipment and electronic equipment
CN114120600B (en) * 2020-08-31 2023-10-24 南京蓝思信息科技有限公司 Method and device for preventing false alarm of intelligent wearable equipment and electronic equipment
CN112671620A (en) * 2020-12-21 2021-04-16 珠海格力电器股份有限公司 Equipment control method and device, storage medium and mobile terminal
CN112466079A (en) * 2021-01-22 2021-03-09 常州百芝龙智慧科技有限公司 Public area security sensing and monitoring equipment and method

Similar Documents

Publication Publication Date Title
CN106204984A (en) A kind of burglary-resisting installation based on wireless signal and method
US20230306834A1 (en) Digital fingerprint tracking
US10902707B1 (en) Video monitoring and alarm verification technology
CN103731633A (en) Television device capable of carrying out remote monitoring and control method of television device
WO2019126785A1 (en) Monitoring system for securing networks from hacker drones
CN108540752B (en) Method, device and system for identifying target object in video monitoring
CN107197456B (en) Detection method and detection device for identifying pseudo AP (access point) based on client
US10055581B2 (en) Locating a wireless communication attack
CN106327408A (en) Electronic doorplate and house personnel management system
CN203340115U (en) Mobile terminal with 3G/WIFI (the 3rd generation telecommunication/wireless fidelity) wireless detecting-monitoring-alarming function
CN105574477A (en) Secure anti-theft method, apparatus and system
CN106097638A (en) A kind of intelligent building security joint defense system
CN105607500B (en) A kind of intelligent safety defense monitoring system
CN205177069U (en) Security protection monitoring alarm
CN213070103U (en) Safety monitoring system
CN107545712A (en) A kind of intelligent household security system
CN204457136U (en) A kind of mobile phone flashlight controls door lock
CN208255966U (en) A kind of access control system of facial characteristics control Image Acquisition
CN110536113A (en) A kind of community security defence monitoring system
CN109191750A (en) A kind of theft preventing method and device
CN107567016A (en) A kind of home security method and device
CN207473776U (en) A kind of Internet of Things home security monitoring alarm equipment
CN210725110U (en) Building intercom security system
CN108540753A (en) monitoring method, device and system
KR20230112294A (en) Security system that utilizes object recognition and face recognition at the same time

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207